The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

The
following
contribution
is
by
guest
blogger
Wes
Simonds.
Over
the
next
few
months,
Wes
will
share
with
you
his
perspective
on
the
role
of
software
in
transforming
business
and
building
a
smarter
planet.
Wes
worked
in
IT
for
seven
years
before
becoming
a
technology
writer
on
topics
including
virtualization,
... [ + Read more ]

Good
strategies
require
good
information;
I
think
we
can
all
agree
on
that.
If
you
want
to
fly
to
Austin,
for
instance,
it's
important
that
you
establish
whether
you
mean
the
Austin
in
Texas
or
the
Austin
in
Minnesota
before
you
buy
your
plane
ticket.
Failure
to
do
so
will
... [ + Read more ]

This
post
was
written
by
Glinda
Cummings,
World
Wide
Senior
Product
Manager,
zSecure
at
IBM.
When
it
comes
to
enterprise
security,
no
news
is
not
necessarily
good
news.
A
lack
of
alerts
about
attempts
to
attack
your
system
doesn’t
mean
they
didn’t
happen—because
chances
are,
they
did.
Many
large
organizations
... [ + Read more ]

Being
able
to
simultaneously
share
and
protect
sensitive
information
is
one
of
the
biggest
challenges
today.
We
need
to
be
confident
that
the
right
people
have
access
to
the
right
information,
but
we
also
don’t
want
to
accomplish
this
at
the
expense
of
business
agility.
Our
world
demands
that
we
... [ + Read more ]

It
seems
that
we
can’t
go
more
than
a
day
or
two
without
hearing
another
story
about
data
loss.
Whether
it
is
the
result
of
an
insider
threat
or
an
external
attacker,
being
able
to
protect
your
data
has
never
been
more
important.
However,
this
has
also
got
to
be
... [ + Read more ]

This
post
is
contributed
by
Kim
Madia,
World
Wide
Product
Marketing
Manager
for
Infosphere.
During
a
recent
trip
to
a
client
site,
we
gathered
key
stakeholders
from
across
business
units
to
discuss
the
broad
topic
of
Data
Governance.
As
part
of
the
telecommunications
industry,
this
client
is
heavily
regulated
and
... [ + Read more ]

I
am
pleased
to
announce
the
first
of
two
"big
data"
IBM
Redbooks
publications:
Implementing
IBM
InfoSphere
BigInsights
on
System
x,
SG24-8077.
Like
all
of
our
Redbooks
publications
(redbooks,
redpapers,
redguides,
and
webdocs),
it
is
available
at
no
charge
to
view
or
download
from
our
website:
http://www.redbooks.ibm.com/abstracts/sg248077.html.
I
will
invite
... [ + Read more ]

I
am
at
a
family
reunion
right
now,
and
my
grandmother
has
come
up
to
me
on
several
occasions
to
talk
about
security.
This
is
a
woman
who
just
got
rid
of
her
Motorola
RAZR
and
is
asking
me
about
data
breaches.
If
you’re
extended
family
is
anything
like
mine,
talking
about
information
... [ + Read more ]

Here
is
the
second
of
two
"big
data"
IBM
Redbooks
publications:
Addressing
Data
Volume,
Velocity,
and
Variety
with
IBM
InfoSphere
Streams
V3.0,
SG24-8108.
You
can
view
and
download
it
at
http://www.redbooks.ibm.com/abstracts/sg248108.html.
The
authors
included
topics
on
Streams
architecture,
installation,
deployment,
administration,
and
integration
with
other
products.
There
is
even
a
... [ + Read more ]